Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.
Результаты поиска
Лучшие результаты Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Дополнительные результаты Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с. Randall Englund and Alfonso Bucero. The Complete Project Manager: Integrating People, Organizational, and Technical Skills. – М.: , 2012. – 0 с. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с. Danny Shiem-shin Then. Real Estate Asset Management: - Operational Property Assets and Facilities Support Services as a Business Resource. – М.: , 2012. – 408 с. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с. Patricia OrdoA±ez de Pablos. Knowledge Management and Drivers of Innovation in Services Industries. – М.: , 2012. – 383 с. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с. David G. Cotts, Edmond P. Rondeau. The Facility Manager's Guide to Finance and Budgeting. – М.: , 0. – 0 с. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с. Willy McCourt, Derek Eldridge. Global Human Resource Management: Managing People in Developing and Transitional Countries. – М.: , 0. – 0 с. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с. Bruce Klatt. The Ultimate Training Workshop Handbook: A Comprehensive Guide to Leading Successful Workshops and Training Programs. – М.: , 0. – 0 с. Joseph M. Firestone. Enterprise Information Portals and Knowledge Management. – М.: Butterworth-Heinemann, 2002. – 456 с. Rolf Wigand, Arnold Picot, Ralf Reichwald. Information, Organization and Management: Expanding Markets and Corporate Boundaries. – М.: , 0. – 0 с. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с. Jae K. Shim. Information Systems and Technology For The Non-Information Systems Executive: An Integrated Resource Management Guide fo. – М.: , 0. – 0 с. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с. John E. Murdock, Terry L. Crum. Common Sense on the Information Revolution and Your Job. – М.: , 0. – 0 с. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с. Physical Security and the Inspection Process. – М.: , 0. – 0 с. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с. Steven W. Floyd, Bill Wooldridge. The Strategic Middle Manager : How to Create and Sustain Competitive Advantage. – М.: , 0. – 0 с. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с. Brian Detlor. Towards Knowledge Portals: From Human Issues to Intelligent Agents (Information Science and Knowledge Management, 19). – М.: , 0. – 0 с. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с. Guy Masterman. Strategic Sports Event Management : An international approach (Hospitality, Leisure and Tourism). – М.: , 2004. – 0 с. Business Process Change Management : ARIS in Practice. – М.: , 2003. – 0 с. Frank Bannister. Purchasing and Financial Management of Information Technology : A practical guide (Computer Weekly Professional). – М.: , 2003. – 0 с. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с. Managing Corporate Information Systems Evolution and Maintenance. – М.: , 2004. – 0 с. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с. Gary R. McClain, Deborah S. Romaine. The Everything Managing People Book: Quick And Easy Ways to Build, Motivate, And Nurture a First-rate Team (Everything: Business and Personal Finance). – М.: , 2007. – 320 с. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с. Knowledge Management: Concepts, Methodologies, Tools and Applications (6-volume set). – М.: IGI Global, 2007. – 3420 с. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с. Selected Readings on Information Technology and Business Systems Management. – М.: , 2008. – 566 с. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с. Jeremy Hall PhD. Grant Management: Funding for Public and Nonprofit Programs. – М.: , 2009. – 225 с. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с. Levent Bayoglu. Management Information Systems And Data Warehousing: A Real Data Warehouse Retail Sample. – М.: , 2010. – 188 с. Frank Bannister. Purchasing and Financial Management of Information Technology. – М.: , 2010. – 384 с. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с. The Emirates Center for Strategic Studies and Research. The Information Revolution and the Arab World: Its Impact on State and Society. – М.: I. B. Tauris, 1998. – 236 с. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с. Karen A. Schuler. E-discovery: Creating and Managing an Enterprisewide Program. – М.: , 2010. – 328 с. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с. Michael Miller. Absolute PC Security and Privacy. – М.: , 2002. – 560 с. Hm Schey. Div, Grad, Curl and All That – An Informal Text on Vector Calculus 4e. – М.: , 2005. – 0 с. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с. Corporate Information Strategy And Management: Text And Cases. – М.: , 2009. – 0 с. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . – с. Carl Roper. Security Education, Awareness and Training. – М.: , 2010. – 400 с. ECSSR. Leadership and Management in Information Age. – М.: I. B. Tauris, 2014. – с. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с. Santu Kumar Jha and Arvind Kumar Tripathi. Plyometrics and Power Training Program. – М.: LAP Lambert Academic Publishing, 2014. – 64 с. Shukuru Nyagawa,Claude Mung'ong'o and Fanuel Shechambo. Information, Education and Communication (IEC)Strategy. – М.: LAP Lambert Academic Publishing, 2011. – 116 с. Lai Oso,Oludayo Soola and Umaru Pate. Media, Governance and Development in Nigeria:. – М.: LAP Lambert Academic Publishing, 2012. – 308 с. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с. Navin Chandra Nainwal and Kanchan Nainwal. Post Harvest Management of Litchi for Marketing and Export. – М.: LAP Lambert Academic Publishing, 2014. – 120 с. MOHAMMED AL-AMIN. APPLICATION OF SPATIAL DATA IN FOREST ECOLOGY AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2011. – 252 с. Amna Arif and Abdul Hameed. Psychologists Serving Persons with Special Needs. – М.: LAP Lambert Academic Publishing, 2013. – 176 с. Tereza Smejkalova. Common Security and Defense Policy from a Geopolitical Perspective. – М.: LAP Lambert Academic Publishing, 2013. – 172 с. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с. Judelyn Salon and Ermelinda Tobias. Dynamics of Society and Development Program Implementation. – М.: LAP Lambert Academic Publishing, 2012. – 180 с. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с. Anastacia Kariuki. Nutritional Management of Obesity, Diabetes and Hypertension. – М.: LAP Lambert Academic Publishing, 2011. – 64 с. Ahmed H. Al- habeeb,Ma'an M. Nayif and Mahmoud Y.M. Taha. Effects of Diode Laser & Chlorhixidine on S.mutans in Coronal Cavity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Vaishnavi Vedam,Karen Boaz and Srikant Natarajan. Autoimmune Oral Lesions. – М.: LAP Lambert Academic Publishing, 2012. – 344 с. Satish Kumar and Arun Choudhary. Weighted Sub-Additive Information Measures and Their Applications. – М.: LAP Lambert Academic Publishing, 2012. – 120 с. Yashwant Singh,Harmendra Kumar Mandia and Laxmi Joshi. Generalized Hypergeometric Function and C- Programming. – М.: LAP Lambert Academic Publishing, 2013. – 212 с. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с. Tahereh Khezrab and Ali Mahbudi. On the Distribution of Information Structures and Focal Points. – М.: LAP Lambert Academic Publishing, 2013. – 324 с. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с. Dhanavandan S. and Magizhnan S. Information Sources and Services. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с. Levent Bayoglu. Management Information Systems And Data Warehousing. – М.: LAP Lambert Academic Publishing, 2010. – 188 с. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с. Mehdi Toloo and Amir Hossein Rahnama. Introduction to Scientific Computing. – М.: Scholars' Press, 2013. – 144 с. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с. Vinayak Bharadi,Hemchandra Kekre and Rita Vora. Retinal Scan Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 108 с. NASER EL-BATHY and Ghassan Azar. Intelligent Information Retrieval and Web Mining. – М.: LAP Lambert Academic Publishing, 2010. – 220 с. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с. Siddaraju V. G. and Gayathri N. K. Information Technology and Economic Development in India. – М.: LAP Lambert Academic Publishing, 2012. – 116 с. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с. S.Edwin Christopher and N. Rekha Jain. Man Power Planning. – М.: LAP Lambert Academic Publishing, 2011. – 88 с. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с. G. Sree Rekha and V.K. Agrawal. Common Interface Banking - A New perspective. – М.: LAP Lambert Academic Publishing, 2012. – 80 с. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с. Лучшие результаты Ничего не найдено Дополнительные результаты Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005. Тренер должен любить людей. интервью со С. Ивановой, старшим партнером, тренером-консультантом KPG Training Center Ivanova & Lebedeva. "Управление персоналом", № 12, июнь 2005. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г. На пути к новому стандарту в торговом финансировании. интервью с А. Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г. Сегментация клиентов в бизнесе private banking & wealth management. Н.В. Чумак, "Банковский ритейл", N 1, I квартал 2011 г. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г. Преданность делу - на первом месте. интервью с Д. Левицким, управляющим партнером компании Retail Training Group. "Управление персоналом", N 14, июль 2010 г. Мотивируйте людей на работу, а не на преданность. интервью с Д. Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008. Образцы работ
Задайте свой вопрос по вашей теме
Контакты
Поделиться
Мы в социальных сетях
Реклама
Отзывы
Екатерина Спасибо Вам большое за консультацию. Поставили 5.